First published: Tue Dec 15 2020(Updated: )
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine.
Credit: security@mozilla.org
Affected Software | Affected Version | How to fix |
---|---|---|
Thunderbird | <78.6 | 78.6 |
Firefox | <84.0 | |
Firefox ESR | <78.6.0 | |
Thunderbird | <78.6.0 | |
Firefox | <84 | 84 |
Firefox ESR | <78.6 | 78.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2020-26978 is classified as a high severity vulnerability that could lead to information disclosure.
To mitigate CVE-2020-26978, users should upgrade to Firefox version 84 or later, or to the latest versions of Firefox ESR or Thunderbird.
CVE-2020-26978 affects Mozilla Firefox versions before 84, Firefox ESR versions before 78.6, and Thunderbird versions before 78.6.
Yes, CVE-2020-26978 can be exploited via a malicious webpage that users visit.
CVE-2020-26978 could expose internal network hosts and services running on the user's local machine.